Git Product home page Git Product logo

documents's Introduction

NSA Documents with OCR text version

Here is the complete list of PDF documents included

01302014-dagbladet-cop15_interception_document.pdf

01312014-cbc-csec_airport_wifi_tracking.pdf

2009-OIG_Report_on_Bulk_Collection.pdf

2011-OIG_Report_on_Bulk_Collection.pdf

20130605-guard-verizon_215_secondary_order.pdf

20130606-wapo-prism.pdf

20130608-guard-boundless_informant_capabilities-(1).pdf

20130608-guard-boundless_informant_faq.pdf

20130608-guard-prism.pdf

20130620-guard-702_minimization_procedures.pdf

20130620-guard-702_targeting_procedures.pdf

20130627-guard-2007_memo_on_us_person_metadata.pdf

20130627-guard-nsa_oig_2009_report.pdf

20130629-wapo-prism.pdf

20130630-guard-dropmire_.pdf

20130710-wapo-upstream.pdf

20130731-guard-xkeyscore_training_slides.pdf

20130809-guard-702_glossary.pdf

20130816-wapo-sid_oversight.pdf

20130816-wapo-so_you_got_a_us_person.pdf

20130816-wapo-sso_news_article.pdf

20130816-wapo-targeting_rationale.pdf

2013-08-30_cryptome_congressional_budget_2013.pdf

20130830_cryptome_congressional_budget_2013.pdf

20130903-globo-satc.pdf

20130905-guard-bullrun.pdf

20130905-guard-cryptanalysis_classification.pdf

20130905-guard-sigint_enabling.pdf

20130908-globo-stormbew_tv.pdf

20130908-globo-stormbrew_tv.pdf

20130908-globo-tv.pdf

20130909-spiegel-smartphones-(1).pdf

20130911-guard-israel_sharing_0.pdf

20130916-spiegel-credit_card_transactions.pdf

20130920-spiegel-belgacom.pdf

20130928-nyt-contact_chaining.pdf

20130928-nyt-syanpse.pdf

20131004-guard-egotistical_giraffe-(1).pdf

20131004-guard-iat_tor.pdf

20131004-guard-tor_stinks.pdf

20131004-wapo-gchq_mullenize.pdf

20131004-wapo-tor.pdf

20131014-wapo-collection_optimization.pdf

20131014-wapo-content_acquisition_optimization1.pdf

20131014-wapo-content_acquisition_optimization2.pdf

20131020-spiegel-mexican_president.pdf

20131021-monde-boundless_informant_france.pdf

20131021-monde-close_access_sigads.pdf

20131021-monde-wanadoo_alcatel.pdf

20131022-monde-prism_april_2013.pdf

20131024-guard-phones_world_leaders.pdf

20131025-monde-french_cyberattacks.pdf

20131027-spiegel-embassy.pdf

20131028-mundo-spain_collections-(1).pdf

20131028-mundo-spain_collections.pdf

20131030-wapo-muscular.pdf

20131030-wapo-muscular_smiley.pdf

20131101-guard-corporate_reporting.pdf

20131104-mundo-boundless_informant.pdf

20131104-mundo-info_sharing_partners.pdf

20131104-nyt-collection_accesses.pdf

20131104-nyt-sigint_goals.pdf

20131104-nyt-sigint_strategic_plan.pdf

20131104-wapo-optimization_google.pdf

20131104-wapo-sso_overview.pdf

20131104-wapo-windstop.pdf

20131117-guardian-dsd_3g.pdf

20131117-spiegel-royal_concierge.pdf

20131119-dagbladet-norway_collection_0.pdf

20131119-odni-ag_guidelines_for_domestic_fbi_operations-(1).pdf

20131119-odni-interim_competency_test_for_access_to_fisa_data.pdf

20131119-odni-nsa_core_intelligence_oversight_training.pdf

20131119-odni-nsa_course_materials_intro_v.13.pdf

20131119-odni-nsa_course_materials_module_1_v.17.pdf

20131119-odni-nsa_course_materials_module_2_v.16.pdf

20131119-odni-nsa_course_materials_module_3_v.22.pdf

_20131119-odni-nsa_course_materials_module_4_v.28.pdf

20131119-odni-nsa_course_materials_module_4_v.28.pdf

20131119-odni-nsa_course_materials_module_5_v.24.pdf

20131119-odni-nsa_course_materials_module_6_analytic_personal_v.18.pdf

20131119-odni-nsa_course_materials_module_6_tech_personnel_v.25.pdf

20131119-odni-nsa_cryptological_school_course_slides_on_legal_compliance_and_minimization_procedures.pdf

20131119-odni-nsa_guidance_memo_on_legal_standards_for_searching_bulk_metadata.pdf

20131119-odni-nsa_metadata_collection_training_slides_.pdf

20131119-odni-nsa_summary_of_requirements_for_collection_of_bulk_metadata.pdf

20131119-odni-office_of_general_council_business_record_analyst_training_slides.pdf

20131119-odni-united_states_signals_intelligence_directive_18_appendix_j.pdf

20131119-odni-united_states_signals_intelligence_directive_18_jan_25_2011.pdf

20131119-odni-verification_slide.pdf

20131120-guard-collection_processing_and_dissemination_of_allied_communications.pdf

20131122-dagbladet-afghanistan_collection.pdf

20131122-dagbladet-boundless_informant_faq.pdf

20131122-dagbladet-boundless_informant.pdf

20131123-nrc-nsa_malware.pdf

20131123-nyt-sigint_strategy_feb_2012.pdf

20131126-huffpo-radicalizers_pornography.pdf

20131126-wapo-microsoft_cloud_exploitation.pdf

20131126-wapo-microsoft_monkey_puzzle.pdf

20131130-GlobeandMail-csec-br-spy.pdf

20131202-cbc-g20.pdf

20131202-guard-dsd_data.pdf

20131204-wapo-chalkfun_foreignness.pdf

20131204-wapo-fascia-(1).pdf

20131204-wapo-fascia.pdf

20131205-espresso-italy_spying.pdf

20131205-svt-fra_russia.pdf

20131209-nyt-nsa_games.pdf

20131210-cbc-nsa_csec_partnership-(1).pdf

20131210-cbc-nsa_csec_partnership.pdf

20131210-wapo-cotraveler_overview.pdf

20131210-wapo-ghost_machine.pdf

20131210-wapo-gsm_classification_guide.pdf

20131210-wapo-location_cookies.pdf

20131210-wapo-target_location-(1).pdf

20131210-wapo-target_location.pdf

20131211-svt-accomplishments_from_nsa.pdf

20131211-svt-baltic_region-(1).pdf

20131211-svt-baltic_region.pdf

20131211-svt-final_agenda_sweden_usa.pdf

20131211-svt-legal_issues_uk_regarding_sweden_and_quantum.pdf

20131211-svt-nsa_internal_pm_on_fra.pdf

20131211-svt-nsa_slides_xkeyscore.pdf

20131211-svt-quantum_from_gchq.pdf

20131211-svt-sweden_neutral.pdf

20131211-svt-xkeyscore_slide_with_swedish_example.pdf

20131211-svt-xkeyscore_sources.pdf

20131211-svt-xkeyscore_sweden_meeting.pdf

20131223-wapo-nsacss-mission.pdf

20131230-appelbaum-nsa_ant_catalog.pdf

20131230-appelbaum-nsa_ant_catalo.pdf

20131230-spiegel-qfire.pdf

20131230-spiegel-tao_intro.pdf

20131230-spiegel-tao_quantum_tasking.pdf

20131230-spiegel-tao_quantum_theory.pdf

2013-watchlist-guidance.pdf

20140102-wapo-quantum_computers_hard_targets.pdf

20140102-wapo-quantum_computing.pdf

20140116-guard-dishfire_presentation.pdf

20140127-nbc-squeaky_dolphin.pdf

20140127-nyt-converged_analysis_on_smartphone_devices.pdf

20140127-nyt-mobile_theme_briefing.pdf

20140128-guard-leaky_phone_apps_0.pdf

20140128-guard-leaky_phone_apps.pdf

20140130-information_dk-cop15_interception_document.pdf

20140131-cbc-csec_airport_wifi_tracking.pdf

20140204-nbc-british_spies_attacked_hactivist_anonymous.pdf

20140207-nbc-gchq_honey_trap_cyber_attack_background_on_jtrig.pdf

20140207-nbc-gchq_honey_trap_cyber_attack_leveraging_foreign_journalists_via_jtrig.pdf

20140207-nrc-boundless_nederland.pdf

20140211-intercept-drones_intercepting_communications.pdf

20140218-intercept-discovery_sigint_targeting_scenarios_and_compliance.pdf

20140218-intercept-gchq_sigdev_.pdf

20140224-intercept-training_for_covert_online_operations.pdf

20140227-guard-gchq_optic.pdf

20140303-epic-doj_report_on_pen_register_fisa_orders.pdf

20140305-nrc-dutch_shares_collected_anti-piracy_information_with_nsa.pdf

20140307-intercept-nsa_ask_zelda_an_interview_with_zelda.pdf

20140307-intercept-nsa_ask_zelda_guilty_until_proven_innocent.pdf

20140307-intercept-nsa_ask_zelda_is_bain_de_soleil_a_bane_on_the_nsa.pdf

20140307-intercept-nsa_ask_zelda_watching_every_word_in_snitch_city.pdf

20140311-nyt-ashcroft_memo_on_intelligence_sharing_procedures.pdf

20140311-nyt-classification_guide_for_fisa_the_protect_america_act_and_the_fisa_amendments_act.pdf

20140311-nyt-classification_guide_for_stellarwind_program_0.pdf

20140311-nyt-nsa_memo_expands_access_to_fisa_information.pdf

20140311-nyt-nsa_timeline_of_surveillance_law_developments.pdf

20140312-intercept-five_eyes_hacking_large_routers.pdf

20140312-intercept-increasing_collection_capacity_by_increasing_implants.pdf

20140312-intercept-mhs_leverages_xkeyscore_for_quantum.pdf

20140312-intercept-multiple_methods_of_quantum.pdf

20140312-intercept-nsa_phishing_tactics_and_man_in_the_middle_attacks.pdf

20140312-intercept-nsa_selector_types.pdf

20140312-intercept-nsa_technology_directorate_analysis_of_converged_data.pdf

20140312-intercept-quantum_insert_diagrams.pdf

20140312-intercept-the_nsa_and_gchqs_quantumtheory_hacking_tactics.pdf

20140312-intercept-turbine_and_turmoil.pdf

20140312-intercept-turbine_industrial_scale_exploitation.pdf

20140312-intercept-vpn_and_voip_exploitation_with_hammerchant_and_hammerstein.pdf

20140313-intercept-nsa_cooperative_third_party_relationships.pdf

20140315-intercept-turbine_intelligence_command_and_control-(1).pdf

20140315-intercept-turbine_intelligence_command_and_control-(2).pdf

20140315-intercept-turbine_intelligence_command_and_control.pdf

20140318-wapo-adding_another_country_to_mystic_program.pdf

20140318-wapo-description_of_data_collection_under_mystic-(1).pdf

20140318-wapo-description_of_data_collection_under_mystic.pdf

20140318-wapo-mystic_program.pdf

20140320-intercept-targeting_system_administrator_accounts.pdf

20140321-le_monde-french_intelligence_e-mail_spying_operation-(1).pdf

20140321-le_monde-french_intelligence_e-mail_spying_operation.pdf

20140322-nyt-operation_shotgiant_objectives.pdf

20140329-der_spiegel-gchq_and_nsa_spy_on_heads_of_state.pdf

20140404-intercept-2009_sigdev_conference.pdf

20140404-intercept-gchq_full_spectrum_cyber_effects.pdf

20140430-intercept-gchq_visit.pdf

20140430-intercept-ghostmachine.pdf

20140430-intercept-prism_olympics.pdf

20140513-greenwald-noplacetohidedocuments.pdf

20140519-intercept-black_budget.pdf

20140519-intercept-dea_warfighter.pdf

20140519-intercept-mystic.pdf

20140519-intercept-somalget.pdf

20140519-intercept-sso_dictionary_excerpt.pdf

20140519-intercept-sso_mystic_charts.pdf

20140531-nyt-identity-intelligence.pdf

20140610-cryptome-dea-nsa-sandkey.pdf

20140616-der_spiegel-analytics_for_targets_in_europe_0.pdf

20140616-der_spiegel-xkeyscore_fingerprints_1.pdf

20140618-dagbladet-black_budget.pdf

20140618-dagbladet-keith_alexander_talking_points.pdf

20140618-DerSpiegel-agenda_for_the_visit_of_bsi_vice_president_andreas_konen_to_the_nsa.pdf

20140618-der_spiegel-boundless_informant_overview_global.pdf

20140618-der_spiegel-boundless_informant_statistics_for_so-called_third_parties.pdf

20140618-der_spiegel-boundless_informant_statistics_on_data_from_22foreign_partners22.pdf

20140618-der_spiegel-boundless_informant_statistics_on_germany.pdf

20140618-der_spiegel-boundless_informant_statistics_on_the_uk.pdf

20140618-der_spiegel-briefing_on_the_visit_to_the_nsa_of_a_high-ranking_bnd_official.pdf

20140618-der_spiegel-cooperation_between_the_nsa_bnd_and_bfv.pdf

20140618-der_spiegel-details_on_xkeyscore_from_an_internal_gchq_website.pdf

20140618-DerSpiegel-European-Technical-Center-Report-on-the-experiences-of-one-NSA-worker-(1).pdf

20140618-DerSpiegel-European-Technical-Center-Report-on-the-experiences-of-one-NSA-worker.pdf

20140618-der_spiegel-excerpt_on_the_sharing_of_xkeyscore_with_german_intelligence_agency_bfv.pdf

20140618-der_spiegel-explanation_of_nymrod_a_system_for_searching_for_people_and_places_in_databases_and_documents.pdf

20140618-der_spiegel-faqs_on_the_boundless_informant_program.pdf

20140618-der_spiegel-final_agenda_of_a_meeting_between_high-ranking_nsa_and_bnd_officials.pdf

20140618-der_spiegel-gchq_report_on_the_technical_abilities_of_tempora.pdf

20140618-der_spiegel-guidelines_for_the_classification_of_nsa_sigint_details_1945-1967.pdf

20140618-der_spiegel-guidelines_for_the_classification_of_suslag_details_and_the_nsa-bnd_cooperation.pdf

20140618-DerSpiegel-internal_nsa_discussion_guidelines_relating_to_cooperation_with_the_bnd_and_bfv.pdf

20140618-der_spiegel-internal_nsa_presentation_on_the_bnds_organization_0.pdf

20140618-der_spiegel-logo_of_nsa-bnd_cooperation.pdf

20140618-der_spiegel-nostalgic_recollections_from_nsa_workers_formerly_stationed_in_bad_aibling.pdf

20140618-der_spiegel-nsacss_europe-_report_on_the_experiences_of_one_nsa_worker.pdf

20140618-der_spiegel-nsacss_presentation_on_technical_surveillance_in_europe_and_africa.pdf

20140618-der_spiegel-nsa_presentation_on_the_work_of_nymrod-(1).pdf

20140618-der_spiegel-nsa_presentation_on_the_work_of_nymrod.pdf

20140618-der_spiegel-overview_of_the_use_of_boundless_informant_world_map.pdf

20140618-der_spiegel-preliminary_agenda_of_a_meeting_between_nsa_and_bnd_officials.pdf

20140618-DerSpiegel-presentation_on_the_nsacia_unit_special_collection_service.pdf

20140618-der_spiegel-report_on_an_nsa_sigdev_training_course_for_allied_countries_.pdf

20140618-der_spiegel-report_on_an_nsa_visit_to_bnd_site_and_on_data_transfer_from_the_bnd_to_the_nsa.pdf

20140618-der_spiegel-report_on_an_unexploded_ordnance_alarm_at_european_technical_centern.pdf

20140618-der_spiegel-report_on_an_xkeyscore_training_session_at_the_ecc_dagger_complex.pdf

20140618-der_spiegel-report_on_a_wharpdrive_incident_in_an_sso_presentation.pdf

20140618-der_spiegel-report_on_data_exchange_between_the_nsa_and_bnd_within_the_jsa_framework.pdf

20140618-der_spiegel-report_on_the_beginnings_of_the_european_security_center_esc_in_the_dagger_complex.pdf

20140618-der_spiegel-report_on_the_changing_of_the_escs_name_to_european_security_operations_center_esoc.pdf

20140618-der_spiegel-report_on_the_nsas_access_to_tempora.pdf

20140618-der_spiegel-report_on_the_one-year_anniversary_of_the_nsa_liaison_unit_suslag_in_bad_aibling.pdf

20140618-der_spiegel-report_on_the_surveillance_of_african_countries_by_jsa.pdf

20140618-der_spiegel-report_on_the_technical_expansion_of_the_european_technical_center_in_wiesbaden.pdf

20140618-der_spiegel-report_on_the_work_of_nsacss_europe.pdf

20140618-der_spiegel-restrictions_on_the_technical_surveillance_performed_by_jsa.pdf

20140618-der_spiegel-us_sites_with_nsa_personnel_in_germany.pdf

20140618-der_spiegel-world_map_from_the_boundless_informant_program.pdf

20140618-DerSpiegel-zoom_of_a_boundless_informant_document_with_project_names.pdf

20140630-WaPo-affidavit_of_keith_alexander_regarding_spying_on_foreign_entities.pdf

20140630-WaPo-fisa_amendments_act_summary_document_1.pdf

20140630-WaPo-fisa_judges_order_authorizing_surveillance_of_foreign_governments_and_organizations.pdf

20140630-WaPo-list_of_governments_and_organizations_authorized_for_surveillance.pdf

20140630-WaPo-odni_certification_regarding_foreign_entities.pdf

20140709-Intercept-spying_on_muslim-american_leaders.pdf

20140714-Intercept-jtrigall.pdf

20140723-Intercept-March-2013-Watchlisting-Guidance.pdf

20140723-WaPo-Post-Signals-Intelligence-Authority-Decision-Tree.pdf

20140725-Intercept-Saudi-Arabia-Information-Paper.pdf

20140803-Intercept-Israel-US-1999-Agreement.pdf

20140803-Intercept-NSA-Intelligence-Relationship-With-Israel.pdf

20140805-Intercept-Directorate-of-Terrorist-Identities-Strategic-Accomplishments-2013.pdf

20140812-Intercept-GCHQ-Covert-Mobile-Phones-Policy.pdf

20140815-Heise-HACIENDA-Program.pdf

20140825-Intercept-CIA-Colleagues-Enthusiastically-Welcome-NSA-Training.pdf

20140825-Intercept-CRISSCROSSPROTON-Point-Paper.pdf

20140825-Intercept-DNI-Decision-Memorandum-on-ICREACH.pdf

20140825-Intercept-ICREACH-Black-Budget-Extract.pdf

20140825-Intercept-ICREACH-Sharing-SIGINT-Comms-Metadata-with-the-Intel-Community-Memo.pdf

20140825-Intercept-ICREACH-Wholesale-Sharing.pdf

20140825-Intercept-Metadata-Policy-Conference.pdf

20140825-Intercept-Metadata-Sharing-Memorandum.pdf

20140825-The-Intercept-Sharing-Communications-Metadata-Across-the-USIC-ICREACH.pdf

20140831-spiegel-collaboration_in_overdrive.pdf

20140831-spiegel-iraq_uk_load_sharing_carriers.pdf

20140831-spiegel-jordan_belgium.pdf

20140831-spiegel-kurdistan_regional_government.pdf

20140831-Spiegel-NCRs-with-Foreign-Relations-Missions-Become-SUSLAs.pdf

20140831-spiegel-nsa_intelligence_relationship_with_turkey.pdf

20140831-spiegel-nsas_oldest_third_party_partnership-(1).pdf

20140831-spiegel-nsas_oldest_third_party_partnership.pdf

20140831-spiegel-sinio_seminar_tough_times_for_turkey-(1).pdf

20140831-spiegel-sinio_seminar_tough_times_for_turkey.pdf

20140831-spiegel-sinio_seminar_turkey_and_the_kurds.pdf

20140831-spiegel-sinio_seminar_turkish_elections.pdf

20140831-spiegel-turkey_and_the_pkk.pdf

20140831-spiegel-turkey_at_the_g20_pre-meeting.pdf

20140831-spiegel-turkey_energy_company_development.pdf

20140831-spiegel-turkish_signal_intelligence_chief_agenda.pdf

20140905-intercept-quadrennial_intelligence_community_review_final_report.pdf

20140914-intercept-ferguson_visit_precis.pdf

20140914-intercept-key_activities_in_progress.pdf

20140914-intercept-speargun_phase_one.pdf

20140914-intercept-speargun_underway.pdf

20140914-spiegel-satellite_teleport_knowledge.pdf

20140914-spiegel-treasure_map_announces_a_new_release-(1).pdf

20140914-spiegel-treasure_map_announces_a_new_release.pdf

20140914-spiegel-treasure_map_presentation-(1).pdf

20140914-spiegel-treasure_map_presentation.pdf

20141010-intercept-cno_core_secrets_security_structure.pdf

20141010-intercept-cno_core_secrets_slide_slices.pdf

20141010-intercept-computer_network_exploitation_classification_guide.pdf

20141010-intercept-eci_compartments.pdf

20141010-intercept-eci_pawleys_classification_guide.pdf

20141010-intercept-eci_whipgenie_classification_guide.pdf

20141010-intercept-exceptionally_controlled_information_listing.pdf

20141010-intercept-sentry_eagle_brief_sheet.pdf

20141010-intercept-tarex_classification_guide.pdf

20141125-sueddeutsche-access_breakdown.pdf

20141125-sz-cable_master_list_ac.pdf

20141125-sz-cable_master_list_fea.pdf

20141125-sz-cable_regions.pdf

20141125-sz-cables_no_current_access.pdf

20141125-sz-cables_where_we_are.pdf

20141125-sz-cables_where_we_want_to_be.pdf

20141125-sz-cne_endpoint_project_load.pdf

20141125-sz-mti_access_project_weekly_status_february_6_2009.pdf

20141125-sz-mti_access_project_weekly_status_june_27_2008.pdf

20141125-sz-mti_access_project_weekly_status_november_28_2008.pdf

20141125-sz-partner_cables.pdf

20141125-sz-ptc_glossary.pdf

20141125-sz-windstop_system_highlights.pdf

20141204-intercept-auroragold_project_overview.pdf

20141204-intercept-auroragold_target_technology_trends_center_support_to_wpmo_0.pdf

20141204-intercept-auroragold_working_aid.pdf

20141204-intercept-auroragold_working_group.pdf

20141204-intercept-ir21_a_technology_warning_mechanism_0.pdf

20141204-intercept-nsa_first_ever_collect_of_high_interest_4g_cellular_signal.pdf

20141204-intercept-nsa_gchq_csec_network_tradecraft_advancement.pdf

20141204-intercept-opulant_pup_encryption_attack.pdf

20141204-intercept-wolframite_encryption_attack-(1).pdf

20141204-intercept-wolframite_encryption_attack.pdf

20141214-intercept-gchq_automated_noc_detection.pdf

20141214-intercept-gchq_hopscotch.pdf

20141214-intercept-gchq_making_network_sense_of_the_encryption.pdf

20141214-Intercept-gchq-mobile-networks-in-my-noc-world.pdf

20141214-intercept-gchq_nac_review_april_june_2011.pdf

20141214-intercept-gchq_nac_review_january_march_2012.pdf

20141214-intercept-gchq_nac_review_july_sept_2011.pdf

20141214-intercept-gchq_nac_review_october_december_2011.pdf

20141214-intercept-gchq_stargate_cne_requirements.pdf

20141228-speigel-analysis_from_ssl-tls_connections_through_gchq_in_the_flying_pig_database_0.pdf

20141228-speigel-analytic_challenges_from_active-passive_integration_when_nsa_attacks_ipsec_vpns_0.pdf

20141228-speigel-analytics_on_security_of_tor_hidden_services_0.pdf

20141228-speigel-a_potential_technique_to_deanonymise_users_of_the_tor_network_0.pdf

20141228-speigel-bluesnort_program_on_net_defense_from_encrypted_communications_0.pdf

20141228-speigel-canadian_document_from_ces_on_tls_trends_0.pdf

20141228-speigel-classification_guide_for_cryptanalysis_0.pdf

20141228-speigel-decryption_of_vpn_connections_within_the_valiantsurf_program_0.pdf

20141228-speigel-description_of_existing_projects_on_vpn_decryption_0.pdf

20141228-spiegel-description_of_voip_telephony_encryption_methods_and_other_ways_to_attack.pdf

20141228-spiegel-description_on_the_processing_of_vpn_data_packets_within_the_turmoil_program.pdf

20141228-spiegel-explanation_of_a_potential_technique_to_deanonymise_users_of_the_tor_network.pdf

20141228-spiegel-explanation_of_the_gallantwave_that_decrypts_vpn_traffic_within_longhaul.pdf

20141228-spiegel-explanation_of_the_poisennut_product_and_its_role_when_attacking_vpn.pdf

20141228-spiegel-explanation_of_the_transform_engine_emulator_when_attacking_vpn.pdf

20141228-spiegel-explanation_of_the_turmoil_gallantwave_program_and_its_role_when_attacking_vpn_0.pdf

20141228-spiegel-explanation_on_the_spin9_program_on_end-to-end_attacks_on_vpn.pdf

20141228-spiegel-gchq_briefing_on_the_bullrun_program.pdf

20141228-spiegel-gchq_presentation_on_the_bullrun_programs_decryption_capabilities.pdf

20141228-spiegel-general_description_how_nsa_handles_encrypted_traffic.pdf

20141228-spiegel-guide_for_analysts_on_how_to_use_the_prism_skype_collection.pdf

20141228-spiegel-intercept_with_otr_encrypted_chat.pdf

20141228-spiegel-intercept_with_pgp_encrypted_message.pdf

20141228-spiegel-intro_to_the_vpn_exploitation_process_mentioning_the_protocols_attacked_-_pptp_ipsec_ssl_ssh.pdf

20141228-spiegel-malibu_architecture_overview_to_exploit_vpn_communication.pdf

20141228-spiegel-_national_information_assurance_research_laboratory_niarl_tundra.pdf

20150117-speigel-analysis_of_chinese_methods_and_performed_actions_in_the_context_of_computer_network_exploitation.pdf

20150117-speigel-classification_guide_for_computer_network_exploitation_cne.pdf

20150117-speigel-combination_of_offensive_and_defensive_missions_-_how_fourth-party_missions_are_being_performed.pdf

20150117-speigel-csec_document_about_the_recognition_of_trojans_and_other_network_based_anomaly_.pdf

20150117-speigel-csec_document_on_the_handling_of_existing_trojans_when_trojanizing_computers.pdf

20150117-speigel-document_about_the_expansion_of_the_remote_operations_center_roc_on_endpoint_operations.pdf

20150117-speigel-document_explaining_the_role_of_the_remote_operations_center_roc.pdf

20150117-spiegel-nsa_example_snowglobe_in_which_a_suspected_french_government_trojan_is_analyzed_to_find_out_if_it_can_be_helpful_for_own_interests_0.pdf

20150117-spiegel-nsa_fourth_party_access_-i_drink_your_milkshake.pdf

20150117-spiegel-nsa_program_tutelage_to_instrumentalize_third_party_attack_tools.pdf

20150117-spiegel-nsa_project_description_to_recognize_and_process_data_that_comes_from_third_party_attacks_on_computers.pdf

20150117-spiegel-nsa_training_course_material_on_computer_network_operations-(1).pdf

20150117-spiegel-nsa_training_course_material_on_computer_network_operations.pdf

20150117-spiegel-overview_of_methods_for_nsa_integrated_cyber_operations_0.pdf

20150117-spiegel-overview_of_the_transgression_program_to_analyze_and_exploit_foreign_cna-cne_exploits.pdf

20150117-spiegel-overview_on_the_nsa_use_of_bots_and_the_defiantwarrior_program.pdf

20150117-spiegel-process_analysts_choose_their_data_requirement_and_then_get_to_know_the_tools_that_can_do_the_job_0.pdf

20150117-spiegel-projects_of_the_tao-ato_department_such_as_the_remote_destruction_of_network_cards.pdf

20150117-spiegel-quantumtheory_is_a_set_of_technologies_allowing_man-on-the-side_interference_attacks_on_tcp-ip_connections_includes_straightbizarre_and_daredev.pdf

20150117-spiegel-report_of_an_nsa_employee_about_a_backdoor_in_the_openssh_daemon.pdf

20150117-spiegel-sample_code_of_a_malware_program_from_the_five_eyes_alliance.pdf

20150117-spiegel-supply-chain_interdiction_-_stealthy_techniques_can_crack_some_of_sigints_hardest_targets.pdf

20150117-spiegel-technical_description_of_the_fashioncleft_protocol_.pdf

20150117-spiegel-the_fashioncleft_protocol_nsa_uses_to_exfiltrate_data_from_trojans_and_implants_to_the_nsa_0.pdf

20150128-cbc-cse_presentation_on_the_levitation_project.pdf

20150128-intercept-cse_presentation_on_the_levitation_project.pdf

20150204-intercept-lovely_horse_0.pdf

20150204-intercept-nato_civilian_intelligence_council_cyber_panel.pdf

20150204-intercept-open_source_for_cyber_defence_progress.pdf

20150204-intercept-who_else_is_targeting_your_target_collecting.pdf

20150210-intercept-iran_current_topics_-_interactions_with_gchq.pdf

20150219-Intercept-CCNE-Email-Addresses-Jan10-Mar10-Trial.pdf

20150219-Intercept-CCNE-Email-Harvesting-Jan10-Mar10-Trial.pdf

20150219-Intercept-CCNE-Stats-Summaries-Jan10-Mar10-Trial.pdf

20150219-Intercept-CCNE-Successes-Jan10-Mar10-Trial.pdf

20150219-Intercept-CNE-Access-to-Core-Mobile-Networks.pdf

20150219-Intercept-Dapino-Gamma-CNE-Presence-Wiki.pdf

20150219-Intercept-Dapino-Gamma-Gemalto-Yuaawaa-Wiki.pdf

20150219-Intercept-Dapino-Gamma-Target-Personalisation-Centres.pdf

20150219-Intercept-IMSIs-Identified-With-Ki-Data-For-Network.pdf

20150219-Intercept-PCS-Harvesting-At-Scale.pdf

20150219-Intercept-Where-are-These-Keys.pdf

ambassadesFrance.pdf

blackhat-Alexander-keynote.pdf

bullrun-briefing-sheet-from-gchq.pdf

ccne-email-addresses-jan10-mar10-trial.pdf

ccne-email-harvesting-jan10-mar10-trial.pdf

ccne-stats-summaries-jan10-mar10-trial.pdf

ccne-successes-jan10-mar10-trial.pdf

CLEANED004.-Cover_Memo-Sealed.pdf

CLEANED007.-CongNotificationInfoMemoSSCI_10_Apr_09-Sealedpdf.pdf

CLEANED032.-Basket_2_-_NSA_training.log.pdf

CLEANED096.-NSA_summary_of_BR_requirements_(maybe_Feb_2009)-.pdf

CLEANEDFinal-USSID_SP0018_Annex_J.pdf

CLEANEDFinal-USSID_SP0018.pdf

CLEANEDPRTT-1.pdf

CLEANEDPRTT-2.pdf

cne-access-to-core-mobile-networks.pdf

csec-br-spy.pdf

dapino-gamma-cne-presence-wiki.pdf

dapino-gamma-gemalto-yuaawaa-wiki.pdf

dapino-gamma-target-personalisation-centres.pdf

discovery-sigint-targeting-scenarios-and.pdf

doc-6-cyber-threat-capabilities.pdf

doj-nsa-memo.pdf

doody.pdf

dsd-3g.pdf

ericsson_reply.pdf

europebriefingnote_en.pdf

eyes_wide_open_v1.pdf

FAA-Certification_Renewals_with_Caveats.pdf

FAA-Certification-Renewals-with-Caveats.pdf

FAA-Minimization_Procedures.pdf

FAA-Minimization-Procedures.pdf

FAA-Targeting_Procedures.pdf

FISC-Order,_BR_06-12.pdf

FISC-Order,-BR-06-12.pdf

gchq-g20-spy.pdf

gchq-mullenize.pdf

gchq-royal-concierge-de.pdf

gchq-se-fra-quantum-3.pdf

General-Alexander_Letter_re_NSA_Fact_Sheet_Inaccuracy.pdf

General-Alexander-Letter-re-NSA-Fact-Sheet-Inaccuracy.pdf

identity-intelligence.pdf

i-hunt-sys-admins.pdf

imsis-identified-with-ki-data-for-network.pdf

invisibility-report-9-0-final.pdf

jtrigall.pdf

Judge-Walton_Answers_to_Questions_re_FISC.pdf

Judge-Walton-Answers-to-Questions-re-FISC.pdf

Lesson-4_-_So_you_got_US_Person_Information.pdf

letter_to_companies.pdf

media-34093.pdf

media-35509.pdf

media-35510.pdf

media-35511.pdf

media-35512.pdf

media-35513.pdf

media-35514.pdf

media-35515.pdf

media-35516.pdf

media-35517.pdf

media-35518.pdf

media-35519.pdf

media-35520.pdf

media-35521.pdf

media-35522.pdf

media-35523.pdf

media-35524.pdf

media-35525.pdf

media-35526.pdf

media-35527.pdf

media-35528.pdf

media-35529.pdf

media-35530.pdf

media-35531.pdf

media-35532.pdf

media-35533.pdf

media-35534.pdf

media-35535.pdf

media-35536.pdf

media-35537.pdf

media-35538.pdf

media-35539.pdf

media-35540.pdf

media-35541.pdf

media-35542.pdf

media-35543.pdf

media-35544.pdf

media-35545.pdf

media-35546.pdf

media-35547.pdf

media-35548.pdf

media-35549.pdf

media-35550.pdf

media-35551.pdf

media-35552.pdf

media-35653.pdf

media-35654.pdf

media-35655.pdf

media-35656.pdf

media-35657.pdf

media-35658.pdf

media-35659.pdf

media-35661.pdf

media-35662.pdf

media-35663.pdf

media-35664.pdf

media-35665.pdf

media-35666.pdf

media-35667.pdf

media-35668.pdf

media-35669.pdf

media-35670.pdf

media-35671.pdf

media-35672.pdf

media-35673.pdf

media-35674.pdf

media-35675.pdf

media-35676.pdf

media-35677.pdf

media-35678.pdf

media-35680.pdf

media-35681.pdf

media-35682.pdf

media-35683.pdf

media-35684.pdf

media-35685.pdf

media-35686.pdf

media-35687.pdf

media-35688.pdf

media-35689.pdf

nokia_reply.pdf

no-place-to-hide.pdf

nsa-5-eyes-partners.pdf

nsa-5-eyes-spy-g20-dk.pdf

nsa-boundless-informant-faq.pdf

NSA-Boundless_Informant_Frequently_Asked_Questions.pdf

NSA-Boundless-Informant-Frequently-Asked-Questions.pdf

nsa-boundlessinformant-no-33m.pdf

nsa-boundless-informant.pdf

NSA-Boundless_Informant_Powerpoint_Slides.pdf

nsa-boundless-informant-slides.pdf

nsa-bullrun-2-16-guardian-13-0905.pdf

nsa-bullrun-brief-nyt-13-0905.pdf

nsa-bullrun-brief-propublica-13-0905.pdf

nsabullrun.pdf

nsa-cable-spy-types.pdf

nsa-catalog-appelbaum.pdf

nsa-chalkfun.pdf

nsa-close-access-sigads.pdf

nsa-cotraveler.pdf

nsa-cryptanalysis-2-12-guardian-13-0905.pdf

nsa-csec-partners.pdf

nsa-css-mission.pdf

nsa-dutch-sigint.pdf

nsa-egotisticalgiraffe.pdf

nsa-fascia.pdf

nsa-finance-spy-de.pdf

nsa-fisa-certification.pdf

nsa-fisa-minimization.pdf

nsa-fisa-targeting.pdf

nsa-g8-g20-spying-02.pdf

nsa-g8-g20-spying.pdf

nsa-gchq-fra-quantum.pdf

nsa-gchq-se-fra-comint.pdf

nsa-gchq-spy-games.pdf

nsa-ghost-machine.pdf

nsa-gsm-tracking.pdf

nsa-hosts-fr-spies.pdf

nsa-iat-tor.pdf

NSA-IG_Report.pdf

nsa-israel-spy.pdf

NSA-Memo_to_DOD_-_Proposed_Amendment_to_Conduct_Analysis_of_Metadata.pdf

NSA-Memo-to-DOD---Proposed-Amendment-to-Conduct-Analysis-of-Metadata.pdf

nsa-microsoft-cloud-exploit.pdf

NSA-Missions_Authorities_Oversight_and_Partnerships.pdf

NSA-Missions-Authorities-Oversight-and-Partnerships.pdf

nsa-muslim-porn.pdf

nsa-overcollection.pdf

nsa-ppd-20.pdf

nsa-prism-13-1021.pdf

nsa-prism-dk.pdf

nsa-prism-guardian-13-1101.pdf

nsa-quantum-computer-2.pdf

nsa-quantum-computer.pdf

nsa-quantum-tasking.pdf

nsa-quantumtheory.pdf

nsa-scissors-2.pdf

nsa-scissors.pdf

NSA-Section_702_and_Section_215_Factsheets.pdf

NSA-Section-702-and-Section-215-Factsheets.pdf

NSA-Section_702_'Loop_Hole'.pdf

nsa-se-fra-quantum-2.pdf

nsa-se-fra-relationship.pdf

nsa-se-fra-ru-baltic.pdf

nsa-se-fra-spying-agenda.pdf

nsa-se-fra-xkeyscore.pdf

nsa-se-fra-xkeyscore-slide.pdf

nsa-se-spies.pdf

nsa-sigint-cryptologic-platform.pdf

nsa-sigint-enabling-guardian-13-0905.pdf

nsa-sigint-enabling-nyt-13-0905.pdf

nsa-sigint-enabling-propublica-13-0905.pdf

nsa-sigint-strategic-mission-2007.pdf

nsa-sigint-strategic-mission-2013.pdf

nsa-sigint-strategy-2012-2016.pdf

nsa-sigint-successes.pdf

nsa-smartphones-analysis.pdf

nsa-smartphones.pdf

nsa-sms-exploit.pdf

nsa-spy-games.pdf

nsa-sso1-guardian-13-1101.pdf

nsa-sso2-guardian-13-1101.pdf

nsa-sso-content.pdf

nsa-sso-dk.pdf

nsa-sso-overview.pdf

nsa-sso-slides.pdf

nsa-stellar-wind.pdf

nsa-tao-ant.pdf

nsa-tao-ant-pdf.pdf

nsa-tao-intro.pdf

nsa-target-location.pdf

nsa-tor.pdf

nsa-tor-stinks.pdf

nsa-verizon-spy.pdf

nsa-wanadoo-alcatel.pdf

nsa-windstop-muscular-incenser.pdf

nsa-windstop.pdf

nsa-xkeyscore.pdf

NSA-XKeyscore_Powerpoint.pdf

NSA-XKeyscore-Powerpoint.pdf

nsa-xkeyscore-sources.pdf

nsa-xkeyscore-tor-slides.pdf

nsa-yahoo-google-exploit.pdf

pcs-harvesting-at-scale.pdf

phonesgchq.pdf

phonesnsa.pdf

PRISM-Overview_Powerpoint_Slides.pdf

PRISM-Overview-Powerpoint-Slides.pdf

PRISM-Powerpoint_Slides_re_Data_Acquisition.pdf

PRISM-Powerpoint-Slides-re-Data-Acquisition.pdf

psychology-a-new-kind-of-sigdev.pdf

rcs-9-admin-final.pdf

rcs-9-analyst-final.pdf

rcs-9-sysadmin-final.pdf

rcs-9-technician-final.pdf

remote-control-system-9-0-changelog-final.pdf

remote-control-system-9-1-changelog-final.pdf

samsung_reply_2.pdf

samsung_reply.pdf

saudi-arabia-information-paper.pdf

Section-215_-_Obama_Administration_White_Paper.pdf

Section-215---Obama-Administration-White-Paper.pdf

Section-215_-_Primary_Order.pdf

Section-215---Primary-Order.pdf

Section-215_-Secondary_Order-_Verizon.pdf

Section-215---Secondary-Order---Verizon.pdf

SID-Oversight_and_Compliance.pdf

SID-Oversight-and-Compliance.pdf

sigint-enabling-project2.pdf

sigint-enabling-project.pdf

spy-budget-fy13.pdf

Targeting-Rationale_-_TAR.pdf

Targeting-Rationale---TAR.pdf

the-art-of-deception-training-for-a-new.pdf

the-nsa-and-gchqs-quantumtheory-hacking-tactics.pdf

turbine-and-turmoil.pdf

UPSTREAM-Powerpoint_Slide.pdf

UPSTREAM-Powerpoint-Slide.pdf

vpn-and-voip-exploitation-with-hammerchant.pdf

What_We_Need_to_Learn_from_Snowden.pdf

where-are-these-keys.pdf

Wyden-Udall-Letter_on_NSA_Fact_Sheet_Inaccuracy.pdf

Wyden-Udall-Letter-on-NSA-Fact-Sheet-Inaccuracy.pdf

documents's People

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

documents's Issues

Out of date

Can you merge in all the new docs since the last update?

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.